CVE-2023-45288

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.

Open
LOW (2.7)
  • T

    Tim Bastin detected CVE-2023-45288 with a risk of 2.7

  • logo

    System updated the risk assessment from 2.7 to 1.35

    System recalculated raw risk assessment

  • T

    Tim Bastin fixed CVE-2023-45288

  • T

    Tim Bastin detected CVE-2023-45288 with a risk of 2.7

  • logo

    System updated the risk assessment from 2.7 to 1.35

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 1.35 to 2.7

    System recalculated raw risk assessment

  • logo

    System removed scanner:

  • logo

    System removed scanner:

  • logo

    System removed scanner:

  • T

    Tim Bastin fixed CVE-2023-45288

  • logo

    System detected CVE-2023-45288 with a risk of 2.7

  • T

    Tim Bastin fixed CVE-2023-45288

  • logo

    System detected CVE-2023-45288 with a risk of 2.7

Add a comment

Mark as False Positive
Last calculated at:

Affected component

Logo von golang stdlib

Installed version:
1.21.8
Fixed in:
v1.21.9

Quick Fix

Update all Dependencies
Update only stdlib
Copyright © 2025 L3montree GmbH and the DevGuard Contributors. All rights reserved. Version 667098114b5ef45c7830e7aa599604fa65eb818f